aaM Upload Feature Image From URL Security & Risk Analysis

wordpress.org/plugins/rajoshik-post-feature-image-from-url

Donate link: http://rajoshik.com Tags: Set feature image from url, Upload image from image url, Requires at least: 3.0 Tested up to: 4.

70 active installs v1.2 PHP + WP + Updated Sep 11, 2018
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is aaM Upload Feature Image From URL Safe to Use in 2026?

Generally Safe

Score 85/100

aaM Upload Feature Image From URL has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 7yr ago
Risk Assessment

The rajoshik-post-feature-image-from-url plugin version 1.2 exhibits a strong security posture based on the provided static analysis. The absence of any detected AJAX handlers, REST API routes, shortcodes, or cron events significantly limits the plugin's attack surface, and importantly, all identified entry points (though zero in count) are reported as protected. The code analysis further reveals good security practices, with no dangerous functions identified, all SQL queries utilizing prepared statements, and the presence of nonce and capability checks. The plugin also avoids external HTTP requests and bundled libraries, which can often be sources of vulnerabilities.

However, a potential area of concern lies in the output escaping. With only 50% of the two identified outputs properly escaped, there's a risk of cross-site scripting (XSS) vulnerabilities if the unescaped data is user-controllable or derived from untrusted sources. While the taint analysis shows no unsanitized paths, this doesn't entirely negate the risk if the unescaped data is indeed dynamic. The plugin's vulnerability history is clean, with no recorded CVEs, which is a positive indicator of its past security. Overall, the plugin demonstrates a good understanding of secure WordPress development, with the primary, albeit moderate, concern being the incomplete output escaping.

Key Concerns

  • Unescaped output detected
Vulnerabilities
None known

aaM Upload Feature Image From URL Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

aaM Upload Feature Image From URL Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
1
1 escaped
Nonce Checks
1
Capability Checks
1
File Operations
3
External Requests
0
Bundled Libraries
0

Output Escaping

50% escaped2 total outputs
Attack Surface

aaM Upload Feature Image From URL Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 3
actionadmin_initimage-from-url.php:18
actionpost_updatedimage-from-url.php:69
actionadmin_headimage-from-url.php:85
Maintenance & Trust

aaM Upload Feature Image From URL Maintenance & Trust

Maintenance Signals

WordPress version tested
Last updatedSep 11, 2018
PHP min version
Downloads5K

Community Trust

Rating88/100
Number of ratings5
Active installs70
Alternatives

aaM Upload Feature Image From URL Alternatives

No alternatives data available yet.

Developer Profile

aaM Upload Feature Image From URL Developer Profile

Md. Abdullah Al Mahim

3 plugins · 90 total installs

87
trust score
Avg Security Score
90/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect aaM Upload Feature Image From URL

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

CSS Classes
rajoshik_meta_boxrajoshik_input_box
Data Attributes
placeholder="Put Image URL Here"
FAQ

Frequently Asked Questions about aaM Upload Feature Image From URL